A Students Attendance System Using QR Code
|
|
|
- Stanley Miller
- 9 years ago
- Views:
Transcription
1 Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University Abstract Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking attendance by university instructors would save lecturing time and hence enhance the educational process. This paper proposes a system that is based on a QR code, which is being displayed for students during or at the beginning of each lecture. The students will need to scan the code in order to confirm their attendance. The paper explains the high level implementation details of the proposed system. It also discusses how the system verifies student identity to eliminate false registrations. Keywords Mobile Computing; Attendance System; Educational System; GPS I. ITRODUCTIO Taking students attendance by university instructors during each class is a time consuming process especially when classes are big. Some faculty policies require this task to be performed by the instructor in each lecture. In other words, out of the total hours that are assigned to a given course, which is typically forty-five hours per semester, up to eight hours may be lost to perform this process that usually takes around ten minutes per lecture. Statistics in [1] shows that 42% of smartphone users have an average age of 26 years old. Thus, with the widespread of smartphones among university students, this paper addresses the problem of such a waste in the lecture time and proposes a system that offers to reduce it by almost 90%. The proposed solution offers a QR code for the students to scan it via a specific smartphone application. The code along with the student identity taken by the application will confirm the students attendance. This way, the system will save not only time but also efforts that were supposed to be put by instructors during each lecture. It will speed up the process of taking attendance and leave much time for the lecture to be given properly. The proposed system also takes care of preventing unauthorized attendance registration using multi-factor authentication. That is, it considers Something you know, Something you have, and Something you are to confirm the student identity. In what follows, we will discuss some related work in section 2. In section 3, we will give an overview to QR codes. In section 4, we will explain how the system works, and finally in section 5, we will conclude the paper. II. RELATED APPROACHES/WORK There are many proposals for Automatic Attendance Systems in the literature and in the market. Most of them do focus on applications to be installed on the lecturer device, whether a smartphone or a laptop. In the section, we will mention briefly few of these proposals. Reference [2] proposes software to be installed in the instructor's mobile telephone. It enables it to query students' mobile telephone via Bluetooth connection and, through transfer of students' mobile telephones' Media Access Control (MAC) addresses to the instructor's mobile telephone; presence of the student can be confirmed. Reference [3] is another example on a proposal that uses real time face detection algorithms integrated on an existing Learning Management System (LMS). It automatically detects and registers students attending on a lecture. The system represents a supplemental tool for instructors, combining algorithms used in machine learning with adaptive methods used to track facial changes during a longer period of time. On the other hand, in [4], the proposal uses fingerprint verification technique. They propose a system in which fingerprint verification is done by using extraction of minutiae technique and the system that automates the whole process of taking attendance. Since biometrics are concerned with the measurements of unique human physiological or behavioral characteristics, the technology has been used to verify the identity of users. It is becoming critical to be able to monitor the presence of the authenticated user throughout a session. Thus, another proposal [5], discusses a prototype system that uses facial recognition technology to monitor authenticated user or students. A neural network-based algorithm was implemented to carry out face detection, and an eigenface method was employed to perform facial recognition. The experimental results demonstrate the feasibility of near-real-time continuous user verification for high-level security information systems.[5] We noticed that most proposals do involve applications being used by the instructor during class. Hence, if the attendance system requires some action from the instructor, then the class time will be disturbed each time the instructor allows some late students into the class. On the other hand, our proposal does require the instructor to do nothing extra beyond presenting the slides of the course to the students. Hence, students may register their presence at any time they wish during the class, while having in mind that registration times are recorded. 75 P a g e
2 Vol. 5, o. 3, 2014 III. QR CODE: QUICK RESPOSE CODE QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or two-dimensional bar code) first designed for the automotive industry in Japan. Bar codes are optical machine-readable labels attached to items that record information related to the item. It was initially patented; however, its patent holder has chosen not to exercise those rights. Recently, the QR Code system has become popular outside the automotive industry due to its fast readability and greater storage capacity compared to standard UPC barcodes. The code consists of black modules (square dots) arranged in a square grid on a white background. The information encoded may be made up of four standardized types ("modes") of data (numeric, alphanumeric, byte / binary, Kanji) or, through supported extensions, virtually any type of data A QR code, as shown in Fig.1 is read by an imaging device, such as a camera, and formatted algorithmically by underlying software using Reed-Solomon error correction until the image can be appropriately interpreted. Data is then extracted from patterns present in both horizontal and vertical components of the image. The QR features are listed in table 1. Figure shows a sample of an unencrypted QR code that will be needed by the proposed system. Fig. 1. Quick Response Code IV. THE PROPOSED SSTEM The system lies between online learning and traditional learning as a facilitation for the attendance record-keeping process, in a way that enriches the lecture time so that it can better be utilized in giving useful materials rather than wasting the time taking attendance. The system requires a simple login process by the class instructor through its Server Module to generate an encrypted QR code with specific information. This can be done at any time before the class. During the class, or at its beginning, the instructor displays an encrypted QR code to the students. The students can then scan the displayed QR code using the system Mobile Module, provided to them through the smartphone market by the university. Along with the student s facial image captured by the mobile application at the time of the scan, the Mobile Module will then communicate the information collected to the Server Module to confirm attendance. The whole process should take less than a minute for any student as well as for the whole class to complete their attendance confirmation. Smartphones may communicate with the server via either the local Wi-Fi coverage offered by the institution or through the internet. TABLE I. CAPACIT, FEATURES, AD STADARDS FOR QR CODE As mentioned earlier, the system is composed of two modules: the Server and the Mobile Modules. The Server Module can be integrated with the elearning platform used by the institution or it can be a separate application depending on the choice of the developer. The following subsection will describe the tasks for each module. A. Server Module The Server Module performs the following tasks: Mediates students attendance requests with the elearning system. Generates a QR code for the instructor Runs Identity check Runs Location check An example of an elearning platform, which is an open source application that has become very popular in recent years, is Moodle. Moodle is used by many institutions worldwide. Among its features is Taking Attendance. It allows the instructors to take attendance online by calling names and checking online the appropriate checkbox next the student name. The checkboxes or radio-buttons offered are marked by P for Present, L for Late, and A for Absent. One of the Server Module jobs is to automatically mark the right radio-button on the attendance sheet list. This module can be developed as a plug-in module to Moodle. When a student sends his/her information via the Mobile Module to the server, as shown in Figure 3, the server in turn sends the Student ID, the lecture date and time, the attendance status, and a small size image of the student face captured by the Mobile Module to the elearning platform. This way, the Moodle plug-in will save the transaction as well as register the appropriate attendance status. To generate the QR code, the instructor logs in the Server Module or the elearning system (if the Server Module is developed as part of the elearning system), to enter the information needed by the system into the QR code. 76 P a g e
3 Vol. 5, o. 3, 2014 Fig. 3. Snapshot of the first slide Fig. 2. The proposed system infrastructure The instructor may choose then to encrypt this code depending on the level of protection needed. The QR code, with or without encryption, will include the following information: Course and section ID Date and beginning time of the lecture Instructor name Some random passcode The information in Fig.1 can be interpreted as shown in Table 2: TABLE II. TEXT EXTRACTED FROM A QR CODE Course: Section: 1 Instructor: Prof. ael Hirzallah Date: 1/1/2014 BeginTime: 10:00AM Passcode: 6FgT4E The instructors in turn copy this QR code and paste it on the first slide to be displayed in the lecture. If the instructor policy is to allow late students in his class and would like to mark them as present or late, then the QR code should also be copied on one of the four corners of as many slides as the instructor wishes. When the students are in class, the first thing that should be done is to pull out their smartphones, open the Mobile Module, and scans the QR code. Figure 3 shows the QR code in one of the slides of the lecture. The third task of the Server Module is to run an identity check on the registered students. This is done by comparing the facial image sent per transaction and that stored image on file for the student in question. A matching score will be added to the attendance sheet so the instructor could perform a manual check either during the lecture or after the lecture. The identity check, or image comparisons, can be done once the attendance registration transaction is received, or at a later scheduled time. Although it is recommended to perform the job once the student signs in with the system to be marked as present, but if the number of students and concurrent lectures are large compared to the speed of the server, then the job could be performed say at a random instant in the second half of the lecture. The purpose of this job, is to allow the instructor to check the results of the identity check before the end of the lecture, if he/she wishes to do so. Finally, a location check will be performed. This task will be discussed later. B. Mobile Module The Mobile Module is the part that students usually install on their smart phones. This could also be integrated with the Mobile part of the elearning platform, or a standalone application that communicates with the Server Module. As mentioned earlier, the communication will be through the local Wi-Fi network, or it could be through the internet. As depicted in Figure 4, once the student sees the QR code on the screen, he/she opens the Mobile application. If it is the first time after restarting the Smartphone, the system requests the student to enter a username and password. Once logged in, the system prompts the student to click on the start button. The system will then capture the face of the student. The facial image will be checked against standard facial conditions, such as locating the eyes. Once the image is accepted, the system requests the user to scan a QR code within a very short time. Once the code is scanned, the system sends the information to the server and resumes working in the background. With that, the process is considered completed. The server in turn will send back an acknowledgment that the process is complete. 77 P a g e
4 Vol. 5, o. 3, 2014 Log in the system Start Timer San QR Code Time Expires Send information to Server Runs system in Background Acknowledge Process completion Fig. 4. Mobile Module Flow Chart Open Application First Time Enter Start or Minimize Start Capture Face Facial check As stated in the previous section, the server verifies the identity of the students by running a facial match. The matching weight along with the facial image will be stored against the presence status of the student. The instructor may recheck any of the student s presence during the lecture by manually checking the updated attendance list that shows the matching weights during or after class. V. AALSIS Standard security procedures require a simple username and password. Such information is called Something you know or What you know. Thus, it is easy for unauthorized users to gain access to a user s private data such as personal and financial details and then use that information to commit fraudulent acts. Using a username and password together with a piece of hardware or device that only the user has makes it harder for potential intruders to gain access and steal that person s personal data or identity. The proposed system will need three steps from each student. These steps are opening the application, capturing the face, and scanning the QR code. The system uses multi-factor authentication to authenticate students. These are something you know which is represented by username and password, something you have which is represented by the Smartphone owned by the student, and finally something you are which is represented by matching the facial image of the student. Thus, unauthorized users are not easy to get access to changing the presence status of one student. However, for taking attendance, the challenge is in the fact that the system must guarantee that such a process do really take place within the classroom and not outside. The only fraudulent act that may happen is when a student sitting outside a classroom receives an image of the displayed QR code from a student sitting inside, via some communication medium such as . This may be enough to simulate the process as if it taken place inside the classroom. To prevent this, the location of the Mobile phone information will accompany the information sent to the server. Currently, Global avigation Satellite Systems, (GSS) receivers are becoming more and more sensitive due to ceaseless progress in chip technology and processing power. High Sensitivity GSS receivers are able to receive satellite signals in most indoor environments and attempts to determine the 3D position indoors have been successful, [6]. Besides increasing the sensitivity of the receivers, the technique of A-GPS can be used, where the almanac and other information are transferred through a mobile phone. Furthermore, as smart phones embrace always-on, ubiquitous location, location-based sensor fusion will become a standard feature. ABI Research s report, Location-based Sensor Fusion: Companies, Technologies, and Revenue Opportunities, [7] outlines how sensor fusion will evolve to support indoor location and the companies best placed to succeed in this space. Once the location information is sent to the server, the center of class will be calculated for all the smart phones locations received until the time of the check. The distance from the center of each Smartphone will be recorded along with the facial matching weights. This will allow the instructor to do a check on the awkward positions of the phones or awkward matching weights during class. In other words, the following information will be communicated to the server per transaction: Student ID from application account Class and time details from QR code Smartphone location from device The list of attendance that shows the status of the student versus the Facial matching weight and Distance can be presented to the instructor upon his/her request. Figure 5 shows an updated attendance list after both facial image matching and distance calculations processes are performed. 78 P a g e
5 Vol. 5, o. 3, 2014 technology to efficiently benefit from the complete assigned time assigned to a lecture. Time taken by instructors to take attendance may be viewed sometimes as a waste of the lecture time, especially when classes are big. For that, we have proposed a way to automate this process using the students devices rather than the instructor s device. In other words, the instructor need not do anything extra during the class beyond presenting the slides of the subject to be taught to the students. The proposed system allows fraud detection based on the GPS locations as well as the facial images taken for each student. Fig. 5. Updated Attendance Sheet Figure 6 shows snapshots of the Mobile application. Fig. 6. Snapshots of the Mobile Module VI. COCLUSIO These days it is required to keep up with the latest technologies, especially in the field of education. Educational institutions have been looking for ways to enhance the educational process using the latest technologies. Looking at the existing situation, we have thought of using the mobile ACKOWLEDGMET The authors wish to acknowledge the financial support received from Applied Science University that helped in publishing this article. REFERECES [1] Smartphone Users Around the World Statistics and Facts, visited on February 12, 2014 [2] Jamil, T. ; Dept. of Electr. & Comput. Eng., Sultan Qaboos Univ., Al Khod, Oman, Automatic attendance recording system using mobile telephone, Telecommunications Forum (TELFOR), th [3] Shehu, V. ; Contemporary Sci. & Technol., South East Eur. Univ., Tetovo, Macedonia ; Dika, A., Using real time computer vision algorithms in automatic attendance management systems, Information Technology Interfaces (ITI), nd International Conference on [4] Saraswat, Chitresh; Kumar, Amit, An Efficient Automatic Attendance System using Fingerprint Verification Technique. International Journal on Computer Science & Engineering. 2010, Vol. 2 Issue 2, p [5] Qinghan Xiao ; Interdept. Biometrics Working Group, Gov. of Canada, O ; Xue Dong ang, A facial presence monitoring system for information security, Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, CIB IEEE Workshop on, March April , [6] Indoor Positioning: visited on January 10, 2014 [7] Location-based Sensor Fusionhttps:// on January 10, 2 79 P a g e
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
A MOBILE PAYMENT SYSTEM WITH AN EXTRA TOKEN OF SECURITY Nael Hirzallah 1 and Sana Nseir 2
A MOBILE PAYMENT SYSTEM WITH AN EXTRA TOKEN OF SECURITY Nael Hirzallah 1 and Sana Nseir 2 1 Applied Science University, Amman, Jordan 2 Zarqa University, Zarqa, Jordan ABSTRACT: The number of people using
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
Degree Certificate Authentication using QR Code and Smartphone
Degree Certificate Authentication using and Smartphone Ankit Singhal M.Tech Computer Science Faculty of Science, Dayalbagh Educational Institute, Dayalbagh, Agra, U.P, India R.S Pavithr Assistant Professor
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Barcode Based Automated Parking Management System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Cross Platform Application for Smartphones Unreserved Ticket Generator for Mumbai Local Trains
Cross Platform Application for Smartphones Unreserved Ticket Generator for Mumbai Local Trains Sangeeta Oswal 1, Pabla Rajinder Singh 2, Mitali Chile 3, Priyanka Tripathi 4 VESIT MCA Department Chembur
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Attendance monitoring as a context-aware service
Attendance monitoring as a context-aware service ALEXANDER SAMOCHADIN [email protected] DIMITRI TIMOFEEV [email protected] DMITRY RAYCHUK [email protected] IGOR KHMELKOV IBS Group Holding
Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah
Journal of mathematics and computer science 10 (2014), 189-198 Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah Miran Hikmat Mohammed Baban Computer Dept.
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Implementation and Security Development Online Exam, Performances and problems for Online University Exam
Implementation and Security Development Online Exam, Performances and problems for Online University Exam Mohammad Attallah Sarrayrih Information Systems and Technology Department, Sur University College
Electronic Questionnaires for Investigations Processing (e-qip)
January 2016 Electronic Questionnaires for Investigations Processing (e-qip) Login Instructions for first-time users OR users that have had their accounts reset Step 1 Access the e-qip Login screen at
AN ANDROID APPLICATION FOR ISSUING AND VERIFYING COMMUTER TRAIN TICKET THROUGH GPS USING CLOUD
BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE) ISSN 2348-0513 Vol. 2, Issue 3, Mar 2014, 47-52 BEST Journals AN ANDROID APPLICATION FOR ISSUING AND VERIFYING
Three Rivers Community College Wireless Network
Three Rivers Community College Wireless Network TRCC s Information Technology Division offers free wireless network connectivity for students. The network grants students high-speed access to the Internet
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
Multi-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Mac OS X Secure Wireless Setup Guide
Mac OS X Secure Wireless Setup Guide Requirements: Apple computer with built-in AirPort card capable of WPA2-Enterprise encryption Mac OS X Snow Leopard version 10.6.0 or greater or Mac OS X Lion version
Demonstration of Barcodes to QR Codes through Text Using Document Software
Demonstration of Barcodes to QR Codes through Text Using Document Software Dr. Neeraj Bhargava 1, Anchal kumawat 2, Dr. Ritu Bhargava 3 Associate Professor, Department of Computer Science, School of Engineering
Challenges of Online Exam, Performances and problems for Online University Exam
www.ijcsi.org 439 Challenges of Online Exam, Performances and problems for Online University Exam Mohammad A Sarrayrih 1, Mohammed Ilyas 2 1 Information System and Technology Department, Sur University
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Step 1. Step 2. Open your browser and go to https://accounts.bestcare.org and you will be presented a logon screen show below.
Manage your two-factor options through the accounts.bestcare.org website. This website is available internally and externally of the organization. Like other services, if you connect while external of
Instructions for Connecting to PACS outside of a Regional Facility
Instructions for Connecting to PACS outside of a Regional Facility For support, please contact the ehealth Saskatchewan Helpdesk at 1-888-316-7446 Recommended options provide optimal performance 1 The
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application
A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application K. Akhila 1 B. Prathyusha 2 M. PavanKumar 3 M. Amrutha 4 Research Scholar Research Scholar Research Scholar
MB-C: Check-in Mobile Application using Barcodes
78 Mohammed Samaka, Qatar University, Doha, Qatar, [email protected] Mohammed Hassan, Qatar University, Doha, Qatar, [email protected] Ahmed Ould Mohamedou, and Mohammed Al-Sada, Qatar University Abstract
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
Configuring WPA2 for Windows XP
Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP with Service Pack 2 Your wireless card must support 802.1x, AES, and WPA2. Windows XP with service pack 2, it is recommended
Remote Access Instructions
document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN
An Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Reviewer Guide Core Functionality
securing your personal data Sticky Password Reviewer Guide Core Functionality Sticky Password is the password manager for the entire lifecycle of your passwords. Strong passwords the built-in password
Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
Secure Testing Options for the University
Secure Testing Options for the University Jason Smith Innovation in Learning Center April 12, 2011 Introduction The University of South Alabama currently offers 350 fully online courses annually. In fall
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
Online Student Attendance Management System using Android
Online Student Attendance Management System using Android ABSTRACT: We have seen over the years that the process of manual attendance has been carried outacross almost all educational institutions. The
AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM
Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI
ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics
MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy
Architecture of a Platform for Building Context-Aware Educational Mobile Services
Architecture of a Platform for Building Context-Aware Educational Mobile Services ALEXANDER SAMOCHADIN [email protected] DIMITRI TIMOFEEV [email protected] MAXIM MASLOV [email protected] Abstract:
PERSONAL DEVELOPMENT SERIES
PERSONAL DEVELOPMENT SERIES GUIDE TO USING THE LEARNING MANAGEMENT SYSTEM Welcome Thank you for choosing the Judgment Index Personal Development Series of courses as a resource for your personal and professional
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
Online Proctoring Services
Online Proctoring Services Observing test takers online using webcams and microphones. It sounds simple, yet for educational institutions, it is no simple task. Kryterion is leading the industry in providing
USAccess System- Registrar. Help Guide. Prepared for
USAccess System- Registrar Help Guide Prepared for United States Department of Agriculture Office of Security 300 7th Street SW, Washington DC 20024 Version 1.0 December 12, 2007 USAccess System Registrar
Summer Project Report. Fingerprint Based Attendance System
Summer Project Report On Fingerprint Based Attendance System Advisor Prof Amey Karkare Submitted by- Rajat Chaudhary Priyaranjan Deepak Kumar Durgesh Deep (Group 02) Introduction The most common means
Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone
International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 4, No. 6, 76-81, 2014 Development of A Computerized Biometric Control Examination Screening And Attendance Monitoring
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three
Introduction to the Professional Development Center
Introduction to the Professional Development Center Overview Materials Navigation Troubleshooting Professional Development Center Materials Skyward Software Tips and Tricks General Simulation Tips Feedback
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Mac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
REAL-TIME ATTENDANCE AND ESTIMATION OF PERFORMANCE USING BUSINESS INTELLIGENCE
REAL-TIME ATTENDANCE AND ESTIMATION OF PERFORMANCE USING BUSINESS INTELLIGENCE Manoj Pandita 1, Pallavi Shinde 2, Dnyanada Shirsat 3, Seema Yadav 4 1 Student, Department of Information Technology, K.J
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION Kalpesh Adhatrao 1, Aditya Gaykar 2, Rohit Jha 3, Vipul Honrao 4 Department of Computer Engineering, Fr. C.R.I.T., Vashi,
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
Eduroam wireless network Apple Mac OSX 10.5
Eduroam wireless network Apple Mac OSX 0. How to configure laptop computers to connect to the eduroam wireless network Contents university for the creative arts Contents Introduction Prerequisites Instructions
Hallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
Automatic Attendance and Mobile Learning System in Sensor-Enabled Heterogeneous and Dynamic University Environment.
Automatic Attendance and Mobile Learning System in Sensor-Enabled Heterogeneous and Dynamic University Environment. Odabi I. Odabi 1 and Erhiri Orobosa Jonathan 2 1 1 Dept. of Computer and Physical Sciences,
Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
Using Mobiles for On Campus Location Tracking
Using Mobiles for On Campus Location Tracking F. Aloul A. Sagahyroon A. Al-Shami I. Al-Midfa R. Moutassem American University of Sharjah P.O. Box 26666, Sharjah, UAE {faloul, asagahyroon, b00020906, b00020142,
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
E-Learning User Manual
E-Learning User Manual 1 University of Puthisastra Lecturer Features Main Page 1 st Main Page Needs a proper login. 1. Select your preferred language from the list box (English or Khmer) 2. To go back
Secure Global Desktop (SGD)
Secure Global Desktop (SGD) Table of Contents Checking your Java Version...3 Preparing Your Desktop Computer...3 Accessing SGD...5 Logging into SGD...6 Using SGD to Access Your Desktop...7 Using SGD to
Development of a Learning Content Management Systems
Development of a Learning Content Management Systems Lejla Abazi-Bexheti Abstract Change appears to be the only constant in the field of ICT and what was treated as advanced feature few years ago is today
Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns
RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO)
Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO) Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2015 Akin Gump Strauss Hauer & Feld LLP Check Point
Introduction. Editions
Introduction TRAIN TRACK Employee Training Management Software gives you the tools you need to make sure employee training requirements are met. Assign required training for groups or individuals. Easily
LogMeIn Hamachi. Getting Started Guide
LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Advanced QR Code Based Identity Card: A New Era for Generating Student ID Card in Developing Countries
2014 First International Conference on Systems Informatics, Modelling and Simulation Advanced QR Code Based Identity Card: A New Era for Generating Student ID Card in Developing Countries Md. Sanaul Haque,
Signature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
QR Codes and Other Symbols Seen in Mobile Commerce
QR Codes and Other Symbols Seen in Mobile Commerce This section describes bar code symbols frequently encountered in mobile commerce campaigns. and typical applications for each are listed. One symbology,
Virtual Code Authentication User s Guide. June 25, 2015
Virtual Code Authentication User s Guide June 25, 2015 Virtual Code Authentication User s Guide Overview of New Security Modern technologies call for higher security standards as practiced among many other
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
How to Access Charge Card Training
How to Access Charge Card Training Within the Knowledge Center (also known as KC Global, or LMS) is a course catalog, which allows you to quickly locate a specific course and launch it. Step 1. Step 2.
Two Factor Authentication - USER GUIDE
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
Two Factor Authentication. Software Version (SV) 1.0
Two Factor Authentication Software Version (SV) 1.0 Property of: Worldwide Interactive Services, Inc. 5025 South Orange Avenue Orlando, FL 32809 The data contained in this documentation is PROPRIETARY
Instructions for Connecting to PACS outside of a Regional Facility
Instructions for Connecting to PACS outside of a Regional Facility For support, please contact the ehealth Saskatchewan Helpdesk at 1-888-316-7446 Recommended options provide optimal performance The following
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 1, 2 M.Tech. (Microelectronics), Department of ECE, SEEC, Manipal University Jaipur (MUJ), Rajasthan, India Abstract:
Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE
Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System
An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach
, pp.203-214 http://dx.doi.org/10.14257/ijsia.2015.9.2.19 An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach Md. Syeful Islam Samsung Research Institute Bangladesh
ISL AlwaysOn 1.0 Manual
Contents 2 Table of Contents Foreword 0 Part I Introduction 3 Part II Security Statement 4 Part III System requirements 6 Part IV Setting up ISL AlwaysOn on a computer 7... 1 Register ISL Online account
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
